< Home

ARP Gateway Anti-Collision

As shown in Figure 1, attacker B forges the gateway address to send a bogus ARP packet to user A. User A considers the attacker to be the gateway and records an incorrect ARP entry for the gateway. As a result, the gateway cannot receive packets from user A and their communication is interrupted.

Figure 1 ARP gateway collision

To prevent bogus gateway attacks, enable ARP gateway anti-collision on the gateway. The gateway considers a gateway collision to have occurred when a received ARP packet meets either of the following conditions:

The device generates an ARP anti-collision entry and discards the received packets with the same source MAC address and VLAN ID in a specified period. This function prevents ARP packets with the bogus gateway address from being broadcast in a VLAN.

In addition, you can enable gratuitous ARP packet sending on the device to broadcast gratuitous ARP packets to all user hosts so that the bogus ARP entries are modified. The gratuitous ARP packets are broadcast to all users so that incorrect ARP entries are corrected.

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >